Analysis

  • max time kernel
    151s
  • max time network
    136s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18-11-2022 14:21

General

  • Target

    file.exe

  • Size

    336KB

  • MD5

    bdfcfdaea2f15e488af7f465eefb8f76

  • SHA1

    9edede4d3754baa79eb726275f9d10b4bc5a7973

  • SHA256

    438ce9fd583ae339b35894e78a472e5351280827cb1037c252c64e186b1229cc

  • SHA512

    4b18f277fd1a5439b98e3bb61a58ce890bb9125b7317517fc1596c18f1775125296c7cd948147398d6e312279b48b466fed4c3a689d6b485aae53764122dd732

  • SSDEEP

    6144:4pONwCMhMfMVDAFKUv7W148zZ+hp0fBa1nugw:hNuhMWDghVXhp0fQ1jw

Malware Config

Extracted

Family

vidar

Version

55.7

Botnet

1827

C2

https://t.me/deadftx

https://www.ultimate-guitar.com/u/smbfupkuhrgc1

Attributes
  • profile_id

    1827

Extracted

Family

redline

Botnet

7m

C2

chardhesha.xyz:81

jalocliche.xyz:81

Attributes
  • auth_value

    76a31c53cee25a40a7e76cc0e46fa9fa

Extracted

Family

amadey

Version

3.50

C2

193.56.146.194/h49vlBP/index.php

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Detect Amadey credential stealer module 4 IoCs
  • Detects Smokeloader packer 1 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 2 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • Blocklisted process makes network request 1 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 6 IoCs
  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 4 IoCs
  • Reads local data of messenger clients 2 TTPs

    Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses 2FA software files, possible credential harvesting 2 TTPs
  • Accesses Microsoft Outlook profiles 1 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 4 IoCs
  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Delays execution with timeout.exe 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 19 IoCs
  • Suspicious use of AdjustPrivilegeToken 26 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\file.exe
    "C:\Users\Admin\AppData\Local\Temp\file.exe"
    1⤵
    • Checks SCSI registry key(s)
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    PID:3492
  • C:\Users\Admin\AppData\Local\Temp\3086.exe
    C:\Users\Admin\AppData\Local\Temp\3086.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:440
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:4320
  • C:\Users\Admin\AppData\Local\Temp\3960.exe
    C:\Users\Admin\AppData\Local\Temp\3960.exe
    1⤵
    • Executes dropped EXE
    • Checks computer location settings
    • Loads dropped DLL
    • Checks processor information in registry
    • Suspicious use of WriteProcessMemory
    PID:444
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c timeout /t 6 & del /f /q "C:\Users\Admin\AppData\Local\Temp\3960.exe" & exit
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4852
      • C:\Windows\SysWOW64\timeout.exe
        timeout /t 6
        3⤵
        • Delays execution with timeout.exe
        PID:3340
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 444 -s 1980
      2⤵
      • Program crash
      PID:4364
  • C:\Users\Admin\AppData\Local\Temp\40C4.exe
    C:\Users\Admin\AppData\Local\Temp\40C4.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of AdjustPrivilegeToken
    PID:4368
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 4368 -s 1264
      2⤵
      • Program crash
      PID:4108
  • C:\Users\Admin\AppData\Local\Temp\4394.exe
    C:\Users\Admin\AppData\Local\Temp\4394.exe
    1⤵
    • Executes dropped EXE
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:4156
    • C:\Users\Admin\AppData\Local\Temp\50c1695437\rovwer.exe
      "C:\Users\Admin\AppData\Local\Temp\50c1695437\rovwer.exe"
      2⤵
      • Executes dropped EXE
      • Checks computer location settings
      • Suspicious use of WriteProcessMemory
      PID:664
      • C:\Windows\SysWOW64\schtasks.exe
        "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN rovwer.exe /TR "C:\Users\Admin\AppData\Local\Temp\50c1695437\rovwer.exe" /F
        3⤵
        • Creates scheduled task(s)
        PID:4752
      • C:\Windows\SysWOW64\rundll32.exe
        "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\bf045808586a24\cred64.dll, Main
        3⤵
        • Blocklisted process makes network request
        • Loads dropped DLL
        • Accesses Microsoft Outlook profiles
        • outlook_win_path
        PID:3976
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 4156 -s 1136
      2⤵
      • Program crash
      PID:2428
  • C:\Windows\SysWOW64\explorer.exe
    C:\Windows\SysWOW64\explorer.exe
    1⤵
      PID:3012
    • C:\Windows\explorer.exe
      C:\Windows\explorer.exe
      1⤵
        PID:4200
      • C:\Windows\SysWOW64\explorer.exe
        C:\Windows\SysWOW64\explorer.exe
        1⤵
          PID:3668
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 4156 -ip 4156
          1⤵
            PID:1100
          • C:\Windows\explorer.exe
            C:\Windows\explorer.exe
            1⤵
              PID:4420
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 444 -ip 444
              1⤵
                PID:1492
              • C:\Windows\SysWOW64\explorer.exe
                C:\Windows\SysWOW64\explorer.exe
                1⤵
                  PID:1744
                • C:\Windows\SysWOW64\explorer.exe
                  C:\Windows\SysWOW64\explorer.exe
                  1⤵
                    PID:2488
                  • C:\Windows\SysWOW64\explorer.exe
                    C:\Windows\SysWOW64\explorer.exe
                    1⤵
                      PID:1584
                    • C:\Windows\explorer.exe
                      C:\Windows\explorer.exe
                      1⤵
                        PID:3144
                      • C:\Windows\SysWOW64\explorer.exe
                        C:\Windows\SysWOW64\explorer.exe
                        1⤵
                          PID:4640
                        • C:\Windows\SysWOW64\WerFault.exe
                          C:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 4368 -ip 4368
                          1⤵
                            PID:5044
                          • C:\Users\Admin\AppData\Local\Temp\50c1695437\rovwer.exe
                            C:\Users\Admin\AppData\Local\Temp\50c1695437\rovwer.exe
                            1⤵
                            • Executes dropped EXE
                            PID:2320
                            • C:\Windows\SysWOW64\WerFault.exe
                              C:\Windows\SysWOW64\WerFault.exe -u -p 2320 -s 416
                              2⤵
                              • Program crash
                              PID:3816
                          • C:\Windows\SysWOW64\WerFault.exe
                            C:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 2320 -ip 2320
                            1⤵
                              PID:1124

                            Network

                            MITRE ATT&CK Matrix ATT&CK v6

                            Execution

                            Scheduled Task

                            1
                            T1053

                            Persistence

                            Scheduled Task

                            1
                            T1053

                            Privilege Escalation

                            Scheduled Task

                            1
                            T1053

                            Credential Access

                            Credentials in Files

                            4
                            T1081

                            Discovery

                            Query Registry

                            4
                            T1012

                            System Information Discovery

                            4
                            T1082

                            Peripheral Device Discovery

                            1
                            T1120

                            Collection

                            Data from Local System

                            4
                            T1005

                            Email Collection

                            1
                            T1114

                            Command and Control

                            Web Service

                            1
                            T1102

                            Replay Monitor

                            Loading Replay Monitor...

                            Downloads

                            • C:\ProgramData\mozglue.dll
                              Filesize

                              593KB

                              MD5

                              c8fd9be83bc728cc04beffafc2907fe9

                              SHA1

                              95ab9f701e0024cedfbd312bcfe4e726744c4f2e

                              SHA256

                              ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a

                              SHA512

                              fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040

                            • C:\ProgramData\nss3.dll
                              Filesize

                              2.0MB

                              MD5

                              1cc453cdf74f31e4d913ff9c10acdde2

                              SHA1

                              6e85eae544d6e965f15fa5c39700fa7202f3aafe

                              SHA256

                              ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5

                              SHA512

                              dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571

                            • C:\Users\Admin\AppData\Local\Temp\3086.exe
                              Filesize

                              473KB

                              MD5

                              633e9a2eb0f0dd9f6645a4c5bd74a0d2

                              SHA1

                              30a4fef0525cb0208ef5d974854039e2c4fc68e1

                              SHA256

                              2c965072de3cd60d9dc8c066b9e5bd3130e0d03a0502e9598dc5493b2297f290

                              SHA512

                              e859173aec75dc88f251540d4acb5b4179271b0a447e3e1e514171f4edb8c738b979e609a7f526ae1bce4c4bda156ff1fdbbcae11a75cc3d5234eddc71963457

                            • C:\Users\Admin\AppData\Local\Temp\3086.exe
                              Filesize

                              473KB

                              MD5

                              633e9a2eb0f0dd9f6645a4c5bd74a0d2

                              SHA1

                              30a4fef0525cb0208ef5d974854039e2c4fc68e1

                              SHA256

                              2c965072de3cd60d9dc8c066b9e5bd3130e0d03a0502e9598dc5493b2297f290

                              SHA512

                              e859173aec75dc88f251540d4acb5b4179271b0a447e3e1e514171f4edb8c738b979e609a7f526ae1bce4c4bda156ff1fdbbcae11a75cc3d5234eddc71963457

                            • C:\Users\Admin\AppData\Local\Temp\3960.exe
                              Filesize

                              274KB

                              MD5

                              39e947318bd7c04280e9266f4b6c0a35

                              SHA1

                              1568c064c8aa24f17549fbbff895fc7eae574dcd

                              SHA256

                              ce3c6cc7e3d80c26246bb01b910992d8c77b1c3f30ec28b79346f15224a3c746

                              SHA512

                              05361abdf59148b763bb5705587a01d8309a5db3b6a8006b70793459af8e48db8c801d41917af9d96e2b74f154a58822d24c4f7585a84f2c5ec43d2f39fb1db2

                            • C:\Users\Admin\AppData\Local\Temp\3960.exe
                              Filesize

                              274KB

                              MD5

                              39e947318bd7c04280e9266f4b6c0a35

                              SHA1

                              1568c064c8aa24f17549fbbff895fc7eae574dcd

                              SHA256

                              ce3c6cc7e3d80c26246bb01b910992d8c77b1c3f30ec28b79346f15224a3c746

                              SHA512

                              05361abdf59148b763bb5705587a01d8309a5db3b6a8006b70793459af8e48db8c801d41917af9d96e2b74f154a58822d24c4f7585a84f2c5ec43d2f39fb1db2

                            • C:\Users\Admin\AppData\Local\Temp\40C4.exe
                              Filesize

                              293KB

                              MD5

                              2dee200193091be2f2321d921750c4ed

                              SHA1

                              4c5b6c7512be4d4e200c4141dc0e90bcabce4ca3

                              SHA256

                              7330807028605eba5b4ecfaca0390b78cb04e4276d1de23eb95b407e1244ef12

                              SHA512

                              4124e9bc1c7c587ce394ad35ec56fd3c6ec4466167df6e00ffa1d88b09b34fa69072d946337cad696223d31d85f8662ff9d5452c474d20cca06d91a8b9c608ad

                            • C:\Users\Admin\AppData\Local\Temp\40C4.exe
                              Filesize

                              293KB

                              MD5

                              2dee200193091be2f2321d921750c4ed

                              SHA1

                              4c5b6c7512be4d4e200c4141dc0e90bcabce4ca3

                              SHA256

                              7330807028605eba5b4ecfaca0390b78cb04e4276d1de23eb95b407e1244ef12

                              SHA512

                              4124e9bc1c7c587ce394ad35ec56fd3c6ec4466167df6e00ffa1d88b09b34fa69072d946337cad696223d31d85f8662ff9d5452c474d20cca06d91a8b9c608ad

                            • C:\Users\Admin\AppData\Local\Temp\4394.exe
                              Filesize

                              373KB

                              MD5

                              fec1747a73aeaf9616760c79685e18b6

                              SHA1

                              aa8c1f2dc78c4b5ca11d90f8093bf211e45f466f

                              SHA256

                              2181a8de38b97624bc70d68ec784622d7526b5d74aea3579827f3e927738cff8

                              SHA512

                              519ae9aec0eb7219571787487687d358bf780f8c7efbbf6935b5a8d61d047b608c1e11f32558bc1cf2e8631d701d3047468644386e2e512a1a6ea1a298600243

                            • C:\Users\Admin\AppData\Local\Temp\4394.exe
                              Filesize

                              373KB

                              MD5

                              fec1747a73aeaf9616760c79685e18b6

                              SHA1

                              aa8c1f2dc78c4b5ca11d90f8093bf211e45f466f

                              SHA256

                              2181a8de38b97624bc70d68ec784622d7526b5d74aea3579827f3e927738cff8

                              SHA512

                              519ae9aec0eb7219571787487687d358bf780f8c7efbbf6935b5a8d61d047b608c1e11f32558bc1cf2e8631d701d3047468644386e2e512a1a6ea1a298600243

                            • C:\Users\Admin\AppData\Local\Temp\50c1695437\rovwer.exe
                              Filesize

                              373KB

                              MD5

                              fec1747a73aeaf9616760c79685e18b6

                              SHA1

                              aa8c1f2dc78c4b5ca11d90f8093bf211e45f466f

                              SHA256

                              2181a8de38b97624bc70d68ec784622d7526b5d74aea3579827f3e927738cff8

                              SHA512

                              519ae9aec0eb7219571787487687d358bf780f8c7efbbf6935b5a8d61d047b608c1e11f32558bc1cf2e8631d701d3047468644386e2e512a1a6ea1a298600243

                            • C:\Users\Admin\AppData\Local\Temp\50c1695437\rovwer.exe
                              Filesize

                              373KB

                              MD5

                              fec1747a73aeaf9616760c79685e18b6

                              SHA1

                              aa8c1f2dc78c4b5ca11d90f8093bf211e45f466f

                              SHA256

                              2181a8de38b97624bc70d68ec784622d7526b5d74aea3579827f3e927738cff8

                              SHA512

                              519ae9aec0eb7219571787487687d358bf780f8c7efbbf6935b5a8d61d047b608c1e11f32558bc1cf2e8631d701d3047468644386e2e512a1a6ea1a298600243

                            • C:\Users\Admin\AppData\Local\Temp\50c1695437\rovwer.exe
                              Filesize

                              373KB

                              MD5

                              fec1747a73aeaf9616760c79685e18b6

                              SHA1

                              aa8c1f2dc78c4b5ca11d90f8093bf211e45f466f

                              SHA256

                              2181a8de38b97624bc70d68ec784622d7526b5d74aea3579827f3e927738cff8

                              SHA512

                              519ae9aec0eb7219571787487687d358bf780f8c7efbbf6935b5a8d61d047b608c1e11f32558bc1cf2e8631d701d3047468644386e2e512a1a6ea1a298600243

                            • C:\Users\Admin\AppData\Roaming\bf045808586a24\cred64.dll
                              Filesize

                              126KB

                              MD5

                              674cec24e36e0dfaec6290db96dda86e

                              SHA1

                              581e3a7a541cc04641e751fc850d92e07236681f

                              SHA256

                              de81531468982b689451e85d249214d0aa484e2ffedfd32c58d43cf879f29ded

                              SHA512

                              6d9898169073c240fe454bd45065fd7dc8458f1d323925b57eb58fa4305bb0d5631bbceb61835593b225e887e0867186ef637c440460279378cb29e832066029

                            • C:\Users\Admin\AppData\Roaming\bf045808586a24\cred64.dll
                              Filesize

                              126KB

                              MD5

                              674cec24e36e0dfaec6290db96dda86e

                              SHA1

                              581e3a7a541cc04641e751fc850d92e07236681f

                              SHA256

                              de81531468982b689451e85d249214d0aa484e2ffedfd32c58d43cf879f29ded

                              SHA512

                              6d9898169073c240fe454bd45065fd7dc8458f1d323925b57eb58fa4305bb0d5631bbceb61835593b225e887e0867186ef637c440460279378cb29e832066029

                            • C:\Users\Admin\AppData\Roaming\bf045808586a24\cred64.dll
                              Filesize

                              126KB

                              MD5

                              674cec24e36e0dfaec6290db96dda86e

                              SHA1

                              581e3a7a541cc04641e751fc850d92e07236681f

                              SHA256

                              de81531468982b689451e85d249214d0aa484e2ffedfd32c58d43cf879f29ded

                              SHA512

                              6d9898169073c240fe454bd45065fd7dc8458f1d323925b57eb58fa4305bb0d5631bbceb61835593b225e887e0867186ef637c440460279378cb29e832066029

                            • memory/440-136-0x0000000000000000-mapping.dmp
                            • memory/440-140-0x00007FF99DF20000-0x00007FF99E9E1000-memory.dmp
                              Filesize

                              10.8MB

                            • memory/440-149-0x00007FF99DF20000-0x00007FF99E9E1000-memory.dmp
                              Filesize

                              10.8MB

                            • memory/440-139-0x000001FAD44C0000-0x000001FAD453A000-memory.dmp
                              Filesize

                              488KB

                            • memory/444-146-0x0000000000400000-0x00000000005A9000-memory.dmp
                              Filesize

                              1.7MB

                            • memory/444-168-0x0000000061E00000-0x0000000061EF3000-memory.dmp
                              Filesize

                              972KB

                            • memory/444-141-0x0000000000000000-mapping.dmp
                            • memory/444-212-0x0000000000400000-0x00000000005A9000-memory.dmp
                              Filesize

                              1.7MB

                            • memory/444-211-0x00000000007E9000-0x0000000000815000-memory.dmp
                              Filesize

                              176KB

                            • memory/444-145-0x0000000000770000-0x00000000007BA000-memory.dmp
                              Filesize

                              296KB

                            • memory/444-144-0x00000000007E9000-0x0000000000815000-memory.dmp
                              Filesize

                              176KB

                            • memory/664-205-0x0000000000400000-0x0000000000861000-memory.dmp
                              Filesize

                              4.4MB

                            • memory/664-203-0x0000000000996000-0x00000000009B5000-memory.dmp
                              Filesize

                              124KB

                            • memory/664-190-0x0000000000000000-mapping.dmp
                            • memory/664-236-0x0000000000400000-0x0000000000861000-memory.dmp
                              Filesize

                              4.4MB

                            • memory/664-235-0x0000000000996000-0x00000000009B5000-memory.dmp
                              Filesize

                              124KB

                            • memory/1584-239-0x0000000000DE0000-0x0000000000DE6000-memory.dmp
                              Filesize

                              24KB

                            • memory/1584-218-0x0000000000DD0000-0x0000000000DDB000-memory.dmp
                              Filesize

                              44KB

                            • memory/1584-216-0x0000000000000000-mapping.dmp
                            • memory/1584-217-0x0000000000DE0000-0x0000000000DE6000-memory.dmp
                              Filesize

                              24KB

                            • memory/1744-209-0x0000000000D60000-0x0000000000D82000-memory.dmp
                              Filesize

                              136KB

                            • memory/1744-210-0x0000000000D30000-0x0000000000D57000-memory.dmp
                              Filesize

                              156KB

                            • memory/1744-237-0x0000000000D60000-0x0000000000D82000-memory.dmp
                              Filesize

                              136KB

                            • memory/1744-208-0x0000000000000000-mapping.dmp
                            • memory/2320-249-0x0000000000400000-0x0000000000861000-memory.dmp
                              Filesize

                              4.4MB

                            • memory/2488-214-0x0000000000A20000-0x0000000000A25000-memory.dmp
                              Filesize

                              20KB

                            • memory/2488-215-0x0000000000A10000-0x0000000000A19000-memory.dmp
                              Filesize

                              36KB

                            • memory/2488-238-0x0000000000A20000-0x0000000000A25000-memory.dmp
                              Filesize

                              20KB

                            • memory/2488-213-0x0000000000000000-mapping.dmp
                            • memory/3012-160-0x0000000000000000-mapping.dmp
                            • memory/3012-167-0x0000000000B90000-0x0000000000B9B000-memory.dmp
                              Filesize

                              44KB

                            • memory/3012-166-0x0000000000BA0000-0x0000000000BA7000-memory.dmp
                              Filesize

                              28KB

                            • memory/3012-229-0x0000000000BA0000-0x0000000000BA7000-memory.dmp
                              Filesize

                              28KB

                            • memory/3144-221-0x00000000004F0000-0x00000000004F7000-memory.dmp
                              Filesize

                              28KB

                            • memory/3144-220-0x0000000000000000-mapping.dmp
                            • memory/3144-222-0x00000000004E0000-0x00000000004ED000-memory.dmp
                              Filesize

                              52KB

                            • memory/3144-240-0x00000000004F0000-0x00000000004F7000-memory.dmp
                              Filesize

                              28KB

                            • memory/3340-207-0x0000000000000000-mapping.dmp
                            • memory/3492-135-0x0000000000400000-0x0000000000858000-memory.dmp
                              Filesize

                              4.3MB

                            • memory/3492-132-0x0000000000907000-0x000000000091C000-memory.dmp
                              Filesize

                              84KB

                            • memory/3492-134-0x0000000000400000-0x0000000000858000-memory.dmp
                              Filesize

                              4.3MB

                            • memory/3492-133-0x0000000000030000-0x0000000000039000-memory.dmp
                              Filesize

                              36KB

                            • memory/3668-200-0x0000000000A20000-0x0000000000A25000-memory.dmp
                              Filesize

                              20KB

                            • memory/3668-198-0x0000000000A10000-0x0000000000A19000-memory.dmp
                              Filesize

                              36KB

                            • memory/3668-191-0x0000000000000000-mapping.dmp
                            • memory/3668-233-0x0000000000A20000-0x0000000000A25000-memory.dmp
                              Filesize

                              20KB

                            • memory/3976-246-0x00000000003D0000-0x00000000003F4000-memory.dmp
                              Filesize

                              144KB

                            • memory/3976-242-0x0000000000000000-mapping.dmp
                            • memory/4156-196-0x00000000008B0000-0x00000000008EE000-memory.dmp
                              Filesize

                              248KB

                            • memory/4156-194-0x0000000000917000-0x0000000000936000-memory.dmp
                              Filesize

                              124KB

                            • memory/4156-197-0x0000000000400000-0x0000000000861000-memory.dmp
                              Filesize

                              4.4MB

                            • memory/4156-155-0x0000000000000000-mapping.dmp
                            • memory/4200-189-0x0000000000730000-0x0000000000739000-memory.dmp
                              Filesize

                              36KB

                            • memory/4200-169-0x0000000000000000-mapping.dmp
                            • memory/4200-192-0x0000000000720000-0x000000000072F000-memory.dmp
                              Filesize

                              60KB

                            • memory/4200-230-0x0000000000730000-0x0000000000739000-memory.dmp
                              Filesize

                              36KB

                            • memory/4320-159-0x00000000052E0000-0x000000000531C000-memory.dmp
                              Filesize

                              240KB

                            • memory/4320-156-0x0000000005280000-0x0000000005292000-memory.dmp
                              Filesize

                              72KB

                            • memory/4320-147-0x0000000000400000-0x000000000042E000-memory.dmp
                              Filesize

                              184KB

                            • memory/4320-148-0x00000000004221BE-mapping.dmp
                            • memory/4320-154-0x0000000005330000-0x000000000543A000-memory.dmp
                              Filesize

                              1.0MB

                            • memory/4320-153-0x00000000057B0000-0x0000000005DC8000-memory.dmp
                              Filesize

                              6.1MB

                            • memory/4368-219-0x0000000005D40000-0x0000000005DA6000-memory.dmp
                              Filesize

                              408KB

                            • memory/4368-228-0x0000000000809000-0x000000000083A000-memory.dmp
                              Filesize

                              196KB

                            • memory/4368-164-0x00000000020D0000-0x000000000210E000-memory.dmp
                              Filesize

                              248KB

                            • memory/4368-227-0x0000000006610000-0x0000000006B3C000-memory.dmp
                              Filesize

                              5.2MB

                            • memory/4368-231-0x0000000000809000-0x000000000083A000-memory.dmp
                              Filesize

                              196KB

                            • memory/4368-232-0x0000000000400000-0x00000000005AE000-memory.dmp
                              Filesize

                              1.7MB

                            • memory/4368-226-0x0000000006430000-0x00000000065F2000-memory.dmp
                              Filesize

                              1.8MB

                            • memory/4368-165-0x0000000000400000-0x00000000005AE000-memory.dmp
                              Filesize

                              1.7MB

                            • memory/4368-163-0x0000000000809000-0x000000000083A000-memory.dmp
                              Filesize

                              196KB

                            • memory/4368-162-0x00000000051B0000-0x0000000005242000-memory.dmp
                              Filesize

                              584KB

                            • memory/4368-161-0x0000000004B80000-0x0000000005124000-memory.dmp
                              Filesize

                              5.6MB

                            • memory/4368-150-0x0000000000000000-mapping.dmp
                            • memory/4420-234-0x0000000000600000-0x0000000000606000-memory.dmp
                              Filesize

                              24KB

                            • memory/4420-201-0x0000000000600000-0x0000000000606000-memory.dmp
                              Filesize

                              24KB

                            • memory/4420-202-0x00000000003F0000-0x00000000003FC000-memory.dmp
                              Filesize

                              48KB

                            • memory/4420-199-0x0000000000000000-mapping.dmp
                            • memory/4640-241-0x0000000001030000-0x0000000001038000-memory.dmp
                              Filesize

                              32KB

                            • memory/4640-225-0x0000000001020000-0x000000000102B000-memory.dmp
                              Filesize

                              44KB

                            • memory/4640-224-0x0000000001030000-0x0000000001038000-memory.dmp
                              Filesize

                              32KB

                            • memory/4640-223-0x0000000000000000-mapping.dmp
                            • memory/4752-204-0x0000000000000000-mapping.dmp
                            • memory/4852-206-0x0000000000000000-mapping.dmp